IBM Security Guardium Data Encryption Sales Level 2 Quiz Attempt Review
IBM Security Guardium Data Encryption Sales Level 2 Quiz Attempt Review
/ IBM Security Guardium Sales Fundamentals Learning Plan - Technology enablement quizzes / IBM Security Guardium Data Encryption Sales Level 2 quiz - 45 minutes
/ IBM Security Guardium Data Encryption Sales Level 2 quiz
Question 1 You have a prospect who has over �ve cloud vendor environments that they need to secure and each cloud vendor has
Correct a different encryption key system. You are con�dent you can win the business by informing them that Guardium for
1.00 points out Cloud Key Management can address their encryption logistic nightmare. Which answer best articulates this position?
of 1.00
a. Guardium for Cloud Key Management is more sophisticated than a native key management solutions.
b. Guardium for Cloud Key Management can delete keys from any cloud service provider, thus rendering the data
encrypted under those keys useless.
c. Guardium for Cloud Key Management provides 3rd party data at rest encryption to databases stored in cloud
service providers.
d. Guardium for Cloud Key Management helps orchestrate the native key management systems of cloud
service providers like AWS, Azure, IBM Cloud and Google Cloud.
The correct answer is: Guardium for Cloud Key Management helps orchestrate the native key management systems of
cloud service providers like AWS, Azure, IBM Cloud and Google Cloud.
Question 2 Which component of Guardium Data Encryption is the central tool for managing keys, security policy and auditing for
Correct the entire platform?
1.00 points out
of 1.00 a. Enterprise Data Encryption Key Management
b. Guardium for File and Database Encryption
c. Guardium for Cloud Key Management
d. CipherTrust Manager
Question 3 Guardium for File and Database Encryption allows you to select different levels of user access policy. If a PRIVILEGED
Correct user attempts to access encrypted data, what will the response be from the server?
1.00 points out
of 1.00 a. Access will be denied
b. Encrypted text/data
c. Clear text/data
d. Tokenized text/data
The correct answer is: Operating system: OS of the database where data is stored
Question 5 You are meeting with a prospective customer and they ask about competitors of IBMs Guardium for Cloud Key
Correct Management offering. You address all but one of the following. Which did you exclude, as they are not considered a
1.00 points out "primary competitor"?
of 1.00
a. Thales
b. Microsoft
c. Amazon
d. MongoDB
Question 7 Which of these is not an advantage that Guardium for Cloud Key Management (GCKM) has versus native key
Correct management?
1.00 points out
of 1.00 a. Allows you to manage encryption keys for on-premise self-encrypting storage
b. Allows you to manage a key's entire lifecycle outside of public cloud
c. Allows you to use your own key material and escrow it in your architecture
d. Allows you to Own the original copy of key material in your data center and restore it back to the cloud as
needed
The correct answer is: Allows you to manage encryption keys for on-premise self-encrypting storage
Question 8 Which is NOT a member of the CipherTrust Manager suite?
Correct
Question 9 Guardium for Cloud Key Management (GCKM) orchestrates the keys across multiple clouds from a centralized platform.
Correct Which of the following use case describes this capability?
1.00 points out
of 1.00 a. GCKM is just what we call the CipherTrust Manager when it's deployed in the cloud.
b. GCKM helps to discover data encryption keys stored in cloud service providers, like AWS, Azure, IBM Cloud
and Google Cloud.
c. GCKM allows you to Bring Your Own Key (BYOK) or Keep Your Own Key (KYOK) to cloud service providers
d. GCKM is an add on-part to Guardium for Enterprise Data Encryption Key Management that extends all its
capabilities to the cloud.
The correct answer is: GCKM allows you to Bring Your Own Key (BYOK) or Keep Your Own Key (KYOK) to cloud service
providers
Question 10 During a deployment discussion with the client's database team, you mention that agents will be placed on whatever
Correct servers contain data that needs to be encrypted. The IT manager interrupts you and asks you to explain what agents
1.00 points out do. You respond by saying that, "Agents are..
of 1.00
The correct answer is: Lightweight pieces of software installed on Windows, Linux or AIX servers that enforce policy,
collect logs, and request and implement keys.
Question 11 You're conducting a data security brie�ng and you highlight the �ve data security fundamentals. The clients wants to
Correct know more about encryption and you do a deeper dive into which security fundamental?
1.00 points out
of 1.00 a. Discover
b. Protect
c. Respond
d. Analyze
1.00 points out a. The CipherTrust Manager does not actually provide multi-domain key management or separation of duties.
of 1.00
b. It is required to meet compliance for all privacy regulations
c. It can be used to separate administrators, the data they can access, from other administrators
d. It makes it easier to determine where there has been a data breach
The correct answer is: It can be used to separate administrators, the data they can access, from other administrators
Question 13 Congratulations! You �nally got a meeting with the CISO and it's time to start preparing. Which of these topics do you
Correct think will be the most relevant for the meeting?
1.00 points out
of 1.00 a. Monetize corporate data
b. Ensure that AI and Big Data is ethically used
c. Ensure data compliance wherever the data resides
d. Determine cost effectiveness of cloud service providers
The correct answer is: Ensure data compliance wherever the data resides
Question 14 You have an existing Guardium customer who needs to desensitize personal information so they can share it with
Correct developers who are building a new application. While the data must be made unreadable from the original form, they
1.00 points out need to preserve the count and referential integrity of the alphanumeric. Which of these encryption approaches do they
of 1.00 need?
a. Encryption
b. Redacting
c. Tokenization
d. Masking
Question 15 A prospect is leaning toward a native encryption solution versus buying another security offering. You mention all of the
Correct following functional bene�ts of Guardium Data Encryption except for which of the following?
1.00 points out
of 1.00 a. Guardium Data Encryption is priced competitively with native encryption.
b. Guardium Data Encryption allows customers to set granular �le access controls.
c. Guardium Data Encryption provides a single policy and management console to monitor and manage data
protection across 1000s of servers.
d. Guardium Data Encryption provides consistent policy enforcement, separation of duties, logging, and auditing
across database platforms.
The correct answer is: Guardium Data Encryption is priced competitively with native encryption.
Question 16 All of the following are use cases for Guardium for File & Database Encryption except for which one choice?
Correct
Question 17 What was the former name of the CipherTrust Manager in GDE version 4 and earlier?
Correct
Question 19 Guardium for File and Database Encryption provides what kind of encryption to prevent against ransomware attacks?
Correct
Question 21 You have made it through the preliminary rounds of your prospect's evaluation process of Guardium File & Database
Correct Encryption. Now they want you to be prepared to talk about how you compare to the competition. Which of these
1.00 points out offerings is your prospect most likely NOT going to ask you about?
of 1.00
Question 23 You have an existing Guardium Data Encryption customer that is questioning how encryption will help with new types
Correct of attacks. In the simplest terms, how would you explain to them what encryption does to combat ransomware
1.00 points out attacks?
of 1.00
The correct answer is: It makes the target data unreadable to the attackers
Question 24 You're pitching Guardium for File and Database Encryption to new prospect who recently moved their data to Amazon
Incorrect Web Services. They abruptly interrupt your pitch and ask you, "Why would I need to use IBM's encryption solution if we
0.00 points out are storing everything in the cloud and protecting it with object storage". Your response to them would be which of the
of 1.00 following?
a. Our new pricing model makes File and Database Encryption an attractive backup option for your data
environment.
b. You have data resident on local storage drives of the Windows, Linux, AIX servers processing the data in the
cloud.
c. While AWS may have encryption at the cloud layer, they do not offer a full suite of data security offerings like
IBM.
d. Ransomware is an aggressive malware attack that requires multiple layers of encryption.
The correct answer is: You have data resident on local storage drives of the Windows, Linux, AIX servers processing the
data in the cloud.
Question 25 You have identi�ed a company that has been a target of both compliance audit failures and is in the same industry
Incorrect where ransomware attacks are on the rise. In your research you have found a list of contacts at the company to reach
0.00 points out out to. Which of these job titles would you spend the LEAST amount of time trying to contact for data security?
of 1.00
a. VP Application Development
b. Security/IT Architect
c. Chief Data Of�cer
d. Chief Information Security Of�cer